Towards Connecting Base Stations over Metro Gigabit Ethernets

Size: px
Start display at page:

Download "Towards Connecting Base Stations over Metro Gigabit Ethernets"

Transcription

1 Towards Connecting Base Stations over Metro Gigabit Ethernets Rainer Baumann and Ulrich Fiedler Computer Engineering and Networks Laboratory ETH Zurich, Switzerland Abstract Deployment of Gigabit Ethernets in metropolitan areas creates new opportunities to save costs by converging data and telephone services. The primary question of our study is whether emerging metropolitan networks can meet the QoS requirements necessary to connect GSM and UMTS base stations. These requirements on delay, jitter, and loss are significantly more stringent than the ones for VoIP and have to be met at the presence of bursty cross traffic. Therefore, we have probed ETH s campus network which spans the metropolitan area of Zurich with traffic comparable to encapsulated E1 traffic from base stations and have measured perceived QoS. Our findings show that the campus network generally meets the QoS requirements. However, the perceived QoS degrades with increasing network utilization. To further investigate the impact of the configuration of Ethernet switches on perceived QoS, we have conducted a simulation study. The results show that the perceived QoS is better when switch buffers are limited to small sizes of 1 MB compared to setups where the number of frames in the buffer is limited. From these results we infer that metropolitan Gigabit Ethernets are well suited for connecting GSM and UMTS base stations. 1 Introduction The deployment of Gigabit Ethernets in metropolitan areas creates new opportunities to save costs by converging data and telephone services. These opportunities include connecting GSM and UMTS base stations over Gigabit Ethernets. However, to make this happen, it has to be carefully investigated whether these emerging metropolitan networks can meet the necessary QoS requirements at the presence of bursty data traffic. These QoS requirements on delay, jitter, and loss are significantly more stringent than the ones for VoIP. Therefore, in this paper, we address the following problems: Do metropolitan networks have a potential to meet necessary QoS requirements for connecting GSM/UMTS base stations? Is there a relation between perceived QoS and network utilization? Do switch buffer limitations impact perceived QoS and if so, how? We report a probing experiment in ETH s campus network which spans the metropolitan area of Zurich. We have probed this network with traffic comparable to encapsulated traffic from base stations and have measured the perceived QoS. Moreover, we report a simulation study on switch buffer limitations. To conduct the probing experiment, we have implemented generator, sink, and archiver applications which run on top of RTAI [1], a hard real-time Linux. The generator generates probing traffic that emulates encapsulated TDM E1 traffic from UMTS and GSM bases stations and injects it into the network. The sink receives the probing traffic and the archiver logs the traffic. After probing, we have analyzed the archived logs. To establish the relation between the average network utilization in this measurement period and QoS perceived by probes, we focused our investigation on six different routes. We chose these routes to include links with low, medium, and high average network utilization, i.e. smaller than 1%, around 1%, and significantly above 1% utilization 1. Each route has been probed for at least 15 days. Our results give strong indications that ETH s campus network can meet QoS requirements for connecting base stations as stated by the Metro Ethernet Forum (MEF) [8]. The only temporary violation of the QoS requirements were on routes that included a link with high average network utilization. Moreover, we have found a general relation between perceived QoS of probing traffic and average network utilization. Perceived QoS decreases as network utilization increases. To further investigate the impact of the configuration of buffer limitations in Ethernet switches on perceived QoS, 1 We note (i) that [9] studies utilization rates of data networks and reports average network utilizations of 1% - 5% in corporate and other networks and (ii) that an average utilization of 5% is sufficient to lead to significant temporary frame loss.

2 Circuit Emulation Adapter Metropolitan Gigabit Ethernet Circuit Emulation Adapter Core Telephony Network (PDH) Figure 1. Scenario of our study we have additionally conducted a simulation study. Our results indicate that limiting the switch buffer by size rather than by number of frames leads to better QoS for base station traffic. Specifically, we have observed that a switch buffer limitation of 1MB has led to a fulfillment of MEF s QoS requirements on delay and loss at an average data traffic network utilization of 1%. We explain this finding with the fact that large data frames are discarded when the buffer is close to full. At the same time the remaining buffer space is large enough to accommodate small frames as used to transport traffic from base stations. The contributions of this paper can thus be summarized as follows: We show measurement results from a probing experiment that show that ETH s campus network generally meets the necessary QoS requirements for connecting GSM/UMTS base stations. The measurement results additionally indicate a general trend between perceived QoS and average network utilization. We show simulation results that indicate that limiting the switch buffer by size rather than by number of frames leads to better QoS for base station traffic. Since data traffic burstiness is invariant [7] and average network utilization in metropolitan networks is typically low [9], we infer that these networks have indeed a potential to connect UMTS/GSM base stations. The rest of the paper is structured as follows: Section 2 reviews the Metro Ethernet Forums QoS requirements for base station traffic in Metro Ethernets. Section 3 reports measurement results from the probing experiment in ETH s campus network. Section 4 reports the simulation study, before we conclude in Section 5. 2 QoS Requirements The Metro Ethernet Forum (MEF) [8] is a consortium of ISPs and network equipment manufacturers that specify quality of service (QoS) requirements for circuit emulation over metropolitan Gigabit Ethernets. The main application for circuit emulation is connecting UMTS and GSM base stations. MEF s QoS requirements pertain (i) to a requirement for frame jitter, i.e. an upper bound to the time elapsed between receiving successive frames, (ii) to a requirement for the maximum delay and (iii) to a requirement for the frame loss rate as listed in table 1. These requirements relate to measurement periods of 3 hours or longer. Metric Jitter Delay Loss rate QoS requirement max. 1 ms max. 25 ms max Table 1. Metro Forum s QoS requirements for base station traffic Moreover, MEF specifies an additional composite requirement that the number of frames that violate any of the three above stated requirements must be bounded. This requirement is called the frame error rate, and is defined as FER = JV R + DV R + LR. (1) where FER: frame error rate JVR: jitter violation rate DVR: delay violation rate LR: loss rate MEF specifies that this frame error rate is less than 8.75

3 1 7 which is equal to the loss rate. We conjecture that the reason behind this specification is that from an application perspective there is no difference between a late frame, a frame that violates the jitter requirement, and a lost frame. 3 Measurement study For the measurement study we probe the operational campus network of ETH Zurich. 3.1 Measurement software generator/sink archiver For the measurements reported in this paper, we have used Dell precision 34 workstations. These workstations are equipped with an Intel Pentium III processor with 1 GHz, 512 MB RAM and a 3COM 3C595 Fast EtherLink network interface card. The factor that limits the accuracy of one-way network delay measurements is the workstation s interrupt latency. This latency depends on the frequency of the PCI 8254 bus, which runs at Hz and is as short as.8μs. To calibrate the clock skew between sender and receiver side, we have directly connected the workstations with a crossover cable for 12 hours. The accuracy after calibration is listed in table 2. This accuracy is at least one order of magnitude smaller than the smallest minimal one-way network delay in our measurements. RT-Applications Linux Stack RT-Stack Virtual Driver RT-Mac RT-Driver NIC Linux Applications RT-Capturing frame stamping Ethernet Avg. delay 1.3μs Std. dev. of delay.51μs Max. delay 13.55μs Sample size Table 2. Accuracy of one-way delay measurements Figure 2. Protocol stack of measurement software To perform the measurements we have implemented a probe generator, a probe sink, and an archiver which run on top of hard real-time Linux on commodity PCs. The protocol stack employed is depicted in figure 2. Our design conceptually follows Pasztor and Veitch [11] who show that such combinations of real-time software and commodity PCs can measure one-way network delays with an accuracy of ± 1 μs. As a hard real-time Linux we have chosen RTAI [1]. RTAI is known for good real-time performance, and available under a GNU public license. For the realtime (RT) protocol stack, we have chosen RTnet [2], a Linux protocol stack modified for real-time networking. RTnet is known to offer atomic send and receive time stamps based on the time stamp counter processor register. The probe generator is a real-time application that uses the RT-driver of the Ethernet card to stamp frames with the sending time before injecting the frames into the network. In addition to the send-time stamp, the generator also provides frame sequence numbers to detect frame duplicates, drops and reordering. The probe sink is a real-time application that stamps incoming frames with a receiver time stamp, and forwards the frames to the archiver. The archiver is a non real-time application that writes the sinked frame into a log file which resides on the workstation s hard disk. Once a day, this log file is transferred to a tape archive. Finally, an off-line task analyzes this log file for the quality of service associated with the archived probing traffic. 3.2 Probing measurement We have probed the ETH Zurich network at different buildings throughout the city with traffic that emulates encapsulated E1 TDM traffic from base stations (8 frames per second, 32 bytes payload per frame plus Ethernet, VLAN, IP, and UDP header). The rate of this traffic has been 5.248Mbit/s. Measurement periods were between 15 and 29 days, i.e. significantly longer than the 3 hours minimum specified in the MEF s QoS requirements. 3.3 Topology The topology of the probed network is depicted in figure 3. This topology follows the CISCO recommendations on using a three level layered hierarchy with a dual core [5]. The core routers are connected to an ISP which connects ETH to the outer world. 3.4 Routes of probing traffic Probing traffic has been injected at the access layer. All routes probed went through a router in the core layer. Both forward and backward direction of the routes have been probed. Forward directions are listed in table 3. The different routes have been probed during disjunct observation intervals.

4 Measurement PCs Access Layer Distribution Layer ISP A1 2x 1 Gbits D1 1 Gbits Core Layer A2 2x 1 Gbits D2 1 Gbits 1 Gbits C1 1 Gbits / BGP / standby A3 2x 1 Gbits D3 1 Gbits 1 Gbits 1 Gbits 2 Gbits / BGP 1 Gbits / BGP C2 Figure 3. Topology of the ETH Zurich network (abstraction) Probing A1 A3 A1 A2 A2 A3 Route A1 D1 C2 D3 A3 A1 D1 C2 D2 A2 A2 D2 C2 D3 A3 Table 3. Routes of probing traffic (forward direction) 3.5 Measurement periods Table 4 lists the paths of the probing measurements, the sample size in terms of number of frames and the duration. Route Sample size Duration [days] A1 A A3 A A1 A A2 A A2 A A3 A Table 4. Summary of probes conducted 3.7 Utilization To be able to make the relation between QoS perceived by probing traffic and network utilization, we have additionally measured link utilizations. The average utilization of the links on the routes that have been probed is listed in table 5 and table 6. Link Utilization Up Utilization Down A1 D1.3%.5% A2 D2.2%.2% A3 D3.4% 1.% Table 5. Avg. util. for access-distribution layer links Link Utilization Up Utilization Down D1 C2.2%.5% D2 C2.5% 1.5% D3 C2 3.1% 5.1% Table 6. Avg. util. for distribution-core layer links 3.6 Perceived QoS Figure 4 depicts the quality of service which the probing traffic received over the full measurement duration. Specifically, this figure lists the loss rate, jitter violation rate, delay violation rate and frame error rate for each of the paths. The frame error rate limitation (FER limitation) bar depicts the Metro Ethernet Forum s overall quality of service requirements. From these measurements, we infer that the high average utilization on the link from C2 to D3 is the underlying cause for the frame loss rates that violate MEF s requirements. To further investigate this violation, we have looked at the temporal distribution of frame losses. Figure 8 shows the temporal distribution of frame losses on the path that experienced a violation of MEF s requirements, i.e. A2 A1 and A1 A3, respectively. From this figure, we infer that the loss rate may be acceptable for several days before heavy data bursts cause a violation of MEF s frame loss rate

5 1.4E-6 1.2E-6 rate 1.E-6 8.E-7 6.E-7 4.E-7 MEF's QoS requirement losses jitter violation delay violation frame error 2.E-7.E+ A1->A3 A3->A1 A1->A2 A2->A1 A2->A3 A3->A2 route Figure 4. Quality of service perceived by probes over the full measurement period requirement. This finding can be explained with the Noah effect [6] in long-range dependent data traffic. In addition to that, one can rank routes according to the frame error rate and compare this ranking to the ranking according to the network utilization on the bottleneck link. This comparison reveals a general correlating trend (see table 7). Route Frame error Rank Bottleneck Rank rate utilization A1 A % 1 A3 A % 3 A1 A % 5 A2 A % 6 A2 A % 1 A3 A % 3 Table 7. Ranking routes according to perceived frame error rate and according to bottleneck util. 4 Simulation study In addition to the probing measurement, we have conducted a simulation study to investigate the relation between switch buffer limitations and QoS perceived by traffic from the base stations. 4.1 Simulation software We use the OpNet modeler [1] as our simulation environment. OpNet modeler is a discrete event simulator that offers hierarchical network models with a focus on layer 2. For our study, we have enhanced OpNet modeler for collecting detailed frame delay and loss statistics to measure the QoS that base station traffic has perceived. 4.2 Switch buffer limitations We make two considerations for the limitation of switch buffer capacity. We refer to a widely used rule-of-thumb and we consider the impact of the MEF s QoS requirements The rule-of-thumb states that the number of frames N the switch buffer should be able accommodate can be calculated with N = RT T C/MTU (2) where RTT denotes the average round-trip time of flows through the link, C the data rate, and MTU the size of the maximum transfer unit. For the data traffic in metropolitan networks we estimate RTT = 1ms and C = 1GBits/s, hence RT T C =1.25MB (3) This estimation and a MTU of 15 bytes lead to a switch buffer capacity of 874 frames. Alternatively, we consider that the MEF s QoS requirement limits the frame delay to 25ms. This upper limit leads to maximum buffer size of 3.2MB. We thus consider the following configurations for limiting buffer capacity.

6 Buffer space Number of frames 1MB 5 2MB 1 Table 8. Switch buffer limitations considered in our simulation study 4.3 Topology Since each switch in a metropolitan network that transports base station traffic has to be configured in a way that the QoS requirements for delay and loss can be met, we focus on representing the most congested switch on this path. This leads to the topology depicted in figure 5 where all links are 1BaseZX and hence have link bandwidth of 1Gbit/s. is also Pareto distributed. The shape parameters of the wait time distribution is set equal to the shape parameter of the transfer size distribution. The average of this distribution is chosen so that the data traffic produced consumes 1% of the capacity of the 1 GBit/s network. Parameter Value Number of On/Off sources 1 On-time: Transfer size Avg. 12KB, α =1.2 Pareto-distributed Max. 4.1GB Off-time Avg. 125 sec Pareto-distributed α =1.2 Table 9. Parameters for the On/Off model to generate data traffic 4.5 Impact of data traffic burstiness Before presenting simulation results, we give a theoretical argument showing that an average data traffic network utilization of 1% is sufficient to cause switch buffer overflows at frequencies that can be expected to degrade the QoS of traffic from base stations beyond MEF s QoS requirements. In the next subsection, we then present the results of a simulation that accounts for effects that ameliorate the negative impact of frequent buffer overflows on base station traffic. For the theoretical argument, we assume that we have only data traffic in our simulation and that access links have unlimited capacity. The frequency how often data frames overflow the switch buffer can then be estimated from the fraction of transfers that are larger than the switch buffer. This fraction p is given with Figure 5. Simulation topology 4.4 Workload generation Encapsulated base station traffic is generated with a constant bit rate of Mbit/s. The bursty data traffic is generated with a set of superposed on/off sources. Sources either subsequently send frames (are in on state) or wait (are in off state). The number of frames send in on state is determined by the size of the associated transfer. Frames are sent at full line speed. The size of transfers is Pareto distributed. The parameters of this distribution are as listed in table 9. We refer to Feldmann et al. [3] for this choice. Moreover, we set a bound on transfer sizes at 4.1GB. This limit of 2 32 bytes accounts for the fact that files stored in popular file systems are not arbitrarily large. The duration of the wait period after the last frame of the transfer is sent p = F 1 (x) =k(1 x) 1 α (4) where F is the cumulative distribution function of transfer sizes and x is the size of the switch buffer 2. The cumulative distribution of the transfer sizes in our simulation is given by ( ) α k F (x) =1 for xɛ[k, ) (5) x where the location parameter k can be inferred from the shape parameter α=1.2 and the average transfer size a=12kb employing the relation k = α 1 α a (6) We now evaluate Equation 4 with setting x to the amount of available switch buffer. The expected frequency of buffer 2 see [4] why quantiles converge fast and lead to meaningful expected values

7 overflows can than be inferred by assuming that the data traffic generation model can be expected to induce 16.6 transfers per second. This number of transfers is calculated from the average utilization of the link and the average transfer size (see table 9). From this argument it follows that for a buffer size of 1 MB, 5.6% of the transfers cause buffer overflows since 1 F 1 (1 MB)=.56 (7) Hence data traffic frames overflow the buffer every 16.7 seconds. Setting a bound on the size of transfers e.g. at 4.1GB has no major impact on these results since 1 F 1 (4.1 GB) = (8) which is much smaller than.56. For a buffer size of 2 MB the corresponding values are 2.4% and 39. seconds. Queue Corresponding Expected size transfer size overflow percentile frequency 1MB every 16.7sec 2MB every 39.sec Table 1. Time to overflow switch buffer with data traffic (at unbounded access link capacity) These theoretical results indicate that data traffic is so bursty that an average data traffic network utilization of 1% is sufficient to cause significant buffer overflows. Moreover, we have checked traffic burstiness with variance time plots and have verified that the Hurst parameter is.9 for at least 5 magnitudes of aggregation on the time axis. 4.6 Simulation results For each buffer limitation listed in table 8 we have seeded the random number generator with 16 different seeds and have run the simulation for 2 hours and 47 minutes simulation time. This leads to a total simulation time of more than 44 hours for each buffer limitation. The resulting QoS that the base station traffic perceived during this time is depicted in figure 6. Detailed results for the different switch buffer limitations are as follows: Limiting the number of frames in the switch buffer as currently done in most operational networks leads to a violation of the QoS requirements. When limiting the switch buffer at 5 frames, only one out of 16 simulation runs meets MEF s QoS requirements for delay and loss. When limiting at 1 frames, only three out of 16 simulation runs meet the QoS requirements for delay and loss. Figure 6. QoS of base station traffic for the switch buffer limitations listed in table 8 We explain this finding with the high burstiness of the data traffic in our simulation. Limiting the switch buffer by size leads to a fulfillment of QoS requirements when the buffer size is not too large. In our simulation, we have found no frame loss and no delayed frames when the switch buffer has been limited to 1MB. However, limiting the buffer at a larger size such as 2MB leads to a significant number of delayed frames which violates the delay requirement. Only three out of 16 simulation runs meet the delay requirement when the switch buffer has been limited to 2MB although no frames have been lost. We explain the finding that no base station traffic frames are lost when the switch buffer is limited by size with a lockout phenomenon (see figure 7 for an illustration). Large data traffic frames are locked out at the end of switch buffer while there is remaining buffer space for small base station traffic frames. We are aware that our simulations tend to over-estimate the effect of this lock-out phenomenon since (i) in real networks the fraction of data traffic frames that have a size close or equal to the MTU of 15 bytes is smaller than in our simulation and (ii) depending on encapsulation and sampling, base station traffic frames can be larger than the 78 bytes in our simulation. However, limiting the switch buffer by size rather by number of frames remains to be the better choice when employing metropolitan networks to transport base station traffic. 5 Conclusion In this paper, we have investigated whether metropolitan networks can potentially meet necessary QoS requirements for connecting GSM/UMTS base stations. We have conducted a measurement study and have probed the operational ETH campus network with traffic comparable to en-

8 References Figure 7. The lock-out phenomenon in the switch buffer. capsulated E1 traffic from base stations for several weeks. We have then measured the QoS our probes perceived. From our results we infer that this network, which spans the metropolitan area of Zurich, can generally meet QoS requirements as specified by the Metro Ethernet Forum. The only temporary violations of the QoS requirements we have found were on routes that included links with high utilization. The results show a general correlating trend between QoS perceived by probing traffic and average network utilization. We have additionally conducted a simulation study to investigate the effect of configurations in buffer limitations of Ethernet switches on perceived QoS. From our results we conclude that limiting the switch buffer by size rather than by number of frames leads to better QoS for base station traffic. Specifically, we have found that a switch buffer limitation to 1MB leads to a fulfillment of MEF s QoS requirements on delay and loss at an average data traffic network utilization of 1%. Assuming that data traffic burstiness and network utilization are the major factors that determine the QoS perceived by base station traffic, we infer that metropolitan Gigabit Ethernets have indeed a potential to connect UMTS/GSM base stations. Finally, we would like to stress that the network probing software used in our measurement study is available on request from the authors. This software will enable the research community, network service providers, and other service providers to assess the QoS of their networks. [1] RTAI, Real-Time Application Interface. [2] RTnet, Hard Real-Time Networking for Linux/RTAI. [3] A. Feldmann, A. C. Gilbert, P. Huang, and W. Willinger. Dynamics of IP traffic: A study of the role of variability and the impact of control. In Proc. of SIGCOMM, pages , [4] U. Fiedler and B. Plattner. Using Latency Quantiles to Engineer QoS Guarantees for Web Services. In Proc. of IWQoS, 23. [5] Cisco Systems Inc. Hierarchical campus design-at-a-glance, 24. available via [6] J. Beran. Statistics for Long-Memory Processes. Monographs on Statistics and Applied Probability. Chapman and Hall, NY, [7] K. Park and W. Willinger. Self-Similar Network Traffic and Performance Evaluation. Wiley-Interscience, NY, 2. [8] Metro Ethernet Forum. Technical Specification MEF3, Circuit Emulation Service Definitions, Framework and Requirements in Metro Ethernet Networks, April 24. [9] A. Odlyzko. Data networks are lightly utilized, and will stay that way. Review of Network Economics, 2(3), September 23. [1] OPNET Technologies Inc. OpNet Modeler 1.5A (PL3), 24. [11] A. Pasztor and D. Veitch. A precision infrastructure for active probing. In Proc. of PAM, Acknowledgment We would like to specially thank Derk Valenkamp and his team from the Informatikdienste for providing us with access to the operational network of ETH Zurich and for their great support. Additional acknowledgment goes to the head of our research group, Prof. Dr. Bernhard Plattner, our industry partner Siemens Schweiz and KTI/CTI, the Innovation Promotion Agency of the Swiss Confederation for funding this project.

9 Drop Statistics A1->A3 Drop Statistics A2->A frame losses / 6min frame losses / 6min minute (a) frame loss A1 to A3 (6 min bins) Drop Statistics A1->A3 minute (b) frame loss A2 to A3 (6 min bins) Drop Statistics A2->A frame losses / hour frame losses / hour frame losses / day hour (c) frame losses A1 to A3 (1 hour bins) Drop Statistics A1->A frame losses / day hour (d) frame losses A2 to A3 (1 hour bins) Drop Statistics A2->A day (e) frame losses A1 to A3 (1 day bins) day (f) frame losses A2 to A3 (1 day bins) Figure 8. Temporal distribution of frame losses on path with high loss.

Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority?

Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority? Institut für Technische Informatik und Kommunikationsnetze Philipp Sager Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority? Post Diploma Thesis NA-2005-02 November 2004

More information

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy

More information

Evaluation of Novel Synchronization Algorithms for Circuit Emulation Adapters

Evaluation of Novel Synchronization Algorithms for Circuit Emulation Adapters Institut für Technische Informatik und Kommunikationsnetze Evaluation of Novel Synchronization Algorithms for Circuit Emulation Adapters TIK Report 240 RainerBaumann, Olga Bondareva, Ulrich Fiedler Computer

More information

High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK

High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK [r.tasker@dl.ac.uk] DataTAG is a project sponsored by the European Commission - EU Grant IST-2001-32459

More information

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.

More information

Presentation_ID. 2002, Cisco Systems, Inc. All rights reserved.

Presentation_ID. 2002, Cisco Systems, Inc. All rights reserved. 1 Gigabit to the Desktop Session Number 2 Gigabit to the Desktop What we are seeing: Today s driver for Gigabit Ethernet to the Desktop is not a single application but the simultaneous use of multiple

More information

Delay Controlled Elephant Flow Rerouting in Software Defined Network

Delay Controlled Elephant Flow Rerouting in Software Defined Network 1st International Conference on Advanced Information Technologies (ICAIT), Nov. 1-2, 2017, Yangon, Myanmar Delay Controlled Elephant Flow Rerouting in Software Defined Network Hnin Thiri Zaw, Aung Htein

More information

Lighting the Blue Touchpaper for UK e-science - Closing Conference of ESLEA Project The George Hotel, Edinburgh, UK March, 2007

Lighting the Blue Touchpaper for UK e-science - Closing Conference of ESLEA Project The George Hotel, Edinburgh, UK March, 2007 Working with 1 Gigabit Ethernet 1, The School of Physics and Astronomy, The University of Manchester, Manchester, M13 9PL UK E-mail: R.Hughes-Jones@manchester.ac.uk Stephen Kershaw The School of Physics

More information

Increase-Decrease Congestion Control for Real-time Streaming: Scalability

Increase-Decrease Congestion Control for Real-time Streaming: Scalability Increase-Decrease Congestion Control for Real-time Streaming: Scalability Dmitri Loguinov City University of New York Hayder Radha Michigan State University 1 Motivation Current Internet video streaming

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS

ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS JUAN CARLOS ARAGON SUMMIT STANFORD UNIVERSITY TABLE OF CONTENTS 1.

More information

Appendix A. Methodology

Appendix A. Methodology 193 Appendix A Methodology In this appendix, I present additional details of the evaluation of Sync-TCP described in Chapter 4. In Section A.1, I discuss decisions made in the design of the network configuration.

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Kommunikationssysteme [KS]

Kommunikationssysteme [KS] Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

ITSF 2007 overview of future sync applications and architecture challenges

ITSF 2007 overview of future sync applications and architecture challenges ITSF 2007 overview of future sync applications and architecture challenges Orange Labs Sébastien JOBERT, Research & Development 14/11/2007, presentation to ITSF 2007, London agenda section 1 section 2

More information

Why You Should Consider a Hardware Based Protocol Analyzer?

Why You Should Consider a Hardware Based Protocol Analyzer? Why You Should Consider a Hardware Based Protocol Analyzer? Software-only protocol analyzers are limited to accessing network traffic through the utilization of mirroring. While this is the most convenient

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Asynchronous Transfer Mode (ATM) ATM concepts

Asynchronous Transfer Mode (ATM) ATM concepts Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into

More information

On the Necessity of Traffic Shaping for PMU Measurement Data Streams

On the Necessity of Traffic Shaping for PMU Measurement Data Streams 1 On the Necessity of Traffic Shaping for PMU Measurement Data Streams Miroslav Popovic, Peng Gao, Dan-Cristian Tomozei, Jean-Yves Le Boudec EPFL, IC-LCA, Switzerland {miroslav.popovic, p.gao, dan-cristian.tomozei,

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Using Time Division Multiplexing to support Real-time Networking on Ethernet

Using Time Division Multiplexing to support Real-time Networking on Ethernet Using Time Division Multiplexing to support Real-time Networking on Ethernet Hariprasad Sampathkumar 25 th January 2005 Master s Thesis Defense Committee Dr. Douglas Niehaus, Chair Dr. Jeremiah James,

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP

Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP Seung-Hwa Chung 1, Deepali Agrawal 1, Myung-Sup Kim 1, James W. Hong 1, and Kihong Park 2 1 DPNM Lab., Dept. of Computer

More information

MODIFIED DIJKSTRA'S ALGORITHM WITH CROSS-LAYER QOS

MODIFIED DIJKSTRA'S ALGORITHM WITH CROSS-LAYER QOS MODIFIED DIJKSTRA'S ALGORITHM WITH CROSS-LAYER QOS Andrei B. RUS Virgil DOBROTA Adrian VEDINAS Georgeta BOANEA Melinda BARABAS Technical University of Cluj-Napoca, Communications Department, 26-28 George

More information

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment This document is provided as-is. Information and views expressed in this document, including

More information

Media Access Control (MAC) Sub-layer and Ethernet

Media Access Control (MAC) Sub-layer and Ethernet Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Measurement Study of Lowbitrate Internet Video Streaming

Measurement Study of Lowbitrate Internet Video Streaming Measurement Study of Lowbitrate Internet Video Streaming Dmitri Loguinov and Hayder Radha CS Dept at CUNY NY and EE/ECE at MSU. In Proceedings of ACM SIGCOMM Workshop on Internet Measurement November 2002

More information

Hands-On Metro Ethernet Carrier Class Networks

Hands-On Metro Ethernet Carrier Class Networks Hands-On Carrier Class Networks Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However customers now use Ethernet as the interface

More information

RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks

RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks RCRT:Rate-Controlled Reliable Transport Protocol for Wireless Sensor Networks JEONGYEUP PAEK, RAMESH GOVINDAN University of Southern California 1 Applications that require the transport of high-rate data

More information

Handles all kinds of traffic on a single network with one class

Handles all kinds of traffic on a single network with one class Handles all kinds of traffic on a single network with one class No priorities, no reservations required Quality? Throw bandwidth at the problem, hope for the best 1000x increase in bandwidth over 2 decades

More information

CSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012

CSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012 CSE 473 Introduction to Computer Networks Jon Turner Final Exam Your name here: 12/17/2012 1. (8 points). The figure below shows a network path connecting a server to a client. 200 km 2000 km 2 km X Y

More information

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Social Environment

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Social Environment SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Social Environment This document is provided as-is. Information and views expressed in this document, including URL and other Internet

More information

NIC TEAMING IEEE 802.3ad

NIC TEAMING IEEE 802.3ad WHITE PAPER NIC TEAMING IEEE 802.3ad NIC Teaming IEEE 802.3ad Summary This tech note describes the NIC (Network Interface Card) teaming capabilities of VMware ESX Server 2 including its benefits, performance

More information

DragonWave, Horizon and Avenue are registered trademarks of DragonWave Inc DragonWave Inc. All rights reserved

DragonWave, Horizon and Avenue are registered trademarks of DragonWave Inc DragonWave Inc. All rights reserved NOTICE This document contains DragonWave proprietary information. Use, disclosure, copying or distribution of any part of the information contained herein, beyond that for which it was originally furnished,

More information

Developing deterministic networking technology for railway applications using TTEthernet software-based end systems

Developing deterministic networking technology for railway applications using TTEthernet software-based end systems Developing deterministic networking technology for railway applications using TTEthernet software-based end systems Project n 100021 Astrit Ademaj, TTTech Computertechnik AG Outline GENESYS requirements

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Monitoring and Analysis

Monitoring and Analysis CHAPTER 3 Cisco Prime Network Analysis Module 5.1 has two types of dashboards: One type is the summary views found under the Monitor menu, and the other type is the over time views found under the Analyze

More information

Application Notes for Foundry Networks FastIron Super X Switch with Avaya Communication Manager - Issue 1.0

Application Notes for Foundry Networks FastIron Super X Switch with Avaya Communication Manager - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Foundry Networks FastIron Super X Switch with Avaya Communication Manager - Issue 1.0 Abstract These Application Notes describe the procedures

More information

Computer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So

Computer Networks. ENGG st Semester, 2010 Hayden Kwok-Hay So Computer Networks ENGG1015 1 st Semester, 2010 Hayden Kwok-Hay So Where are we in the semester? High Level Applications Systems Digital Logic Image & Video Processing Computer & Embedded Systems Computer

More information

Oscillation of RED with 2way TCP bulk data traffic

Oscillation of RED with 2way TCP bulk data traffic First Author: Oscillation of RED with way TCP bulk data traffic Thomas Ziegler, Salzburg Polytechnic University; Thomas.Ziegler@fh-sbg.ac.at Second Author: Bernhard Hechenleitner, Salzburg Polytechnic

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer Overview, Router Design, IP Sec 4.1. 4.2 and 4.3 Prof. Lina Battestilli Fall 2017 Chapter 4: Network Layer, Data Plane chapter goals: understand

More information

Validation of Router Models in OPNET

Validation of Router Models in OPNET Validation of Router Models in OPNET B. Van den Broeck, P. Leys, J. Potemans 1, J. Theunis, E. Van Lil, A. Van de Capelle Katholieke Universiteit Leuven (K.U.Leuven) Department of Electrical Engineering

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Bandwidth Guarantee using Class Based Weighted Fair Queue (CBWFQ) Scheduling Algorithm

Bandwidth Guarantee using Class Based Weighted Fair Queue (CBWFQ) Scheduling Algorithm Bandwidth Guarantee using Class Based Weighted Fair Queue (CBWFQ) Scheduling Algorithm Idris Zakariyya 1, M Nordin A Rahman 2 1 Faculty of Informatics and Computing, University Sultan Zainal Abidin, Terengganu,

More information

Progress Report No. 3. A Case Study on Simulation Scenario

Progress Report No. 3. A Case Study on Simulation Scenario NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 3 A Case Study on Simulation Scenario The University of Canterbury Team 21 December 2005 Progress Report This report

More information

Multi-class Applications for Parallel Usage of a Guaranteed Rate and a Scavenger Service

Multi-class Applications for Parallel Usage of a Guaranteed Rate and a Scavenger Service Department of Computer Science 1/18 Multi-class Applications for Parallel Usage of a Guaranteed Rate and a Scavenger Service Markus Fidler fidler@informatik.rwth-aachen.de Volker Sander sander@fz.juelich.de

More information

What is traveling on the wires? due to Web and http barriers to streaming traffic implosion technical and other

What is traveling on the wires? due to Web and http barriers to streaming traffic implosion technical and other What is traveling on the wires? Mixed data: bulk data, audio/voice, video/image, real-time interactive data, etc. > 85% of Internet traffic is bulk TCP traffic due to Web and http barriers to streaming

More information

Chapter III. congestion situation in Highspeed Networks

Chapter III. congestion situation in Highspeed Networks Chapter III Proposed model for improving the congestion situation in Highspeed Networks TCP has been the most used transport protocol for the Internet for over two decades. The scale of the Internet and

More information

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

AT&T Collaborate TM. Network Assessment Tool

AT&T Collaborate TM. Network Assessment Tool AT&T Collaborate TM Network Assessment Tool 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T

More information

Mininet Performance Fidelity Benchmarks

Mininet Performance Fidelity Benchmarks Mininet Performance Fidelity Benchmarks Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, Bob Lantz, Nick McKeown October 21, 2012 1 Introduction This initial Mininet technical report evaluates the

More information

RSVP Support for RTP Header Compression, Phase 1

RSVP Support for RTP Header Compression, Phase 1 RSVP Support for RTP Header Compression, Phase 1 The Resource Reservation Protocol (RSVP) Support for Real-Time Transport Protocol (RTP) Header Compression, Phase 1 feature provides a method for decreasing

More information

Sequence Number. Acknowledgment Number. Data

Sequence Number. Acknowledgment Number. Data CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make

More information

46PaQ. Dimitris Miras, Saleem Bhatti, Peter Kirstein Networks Research Group Computer Science UCL. 46PaQ AHM 2005 UKLIGHT Workshop, 19 Sep

46PaQ. Dimitris Miras, Saleem Bhatti, Peter Kirstein Networks Research Group Computer Science UCL. 46PaQ AHM 2005 UKLIGHT Workshop, 19 Sep 46PaQ Dimitris Miras, Saleem Bhatti, Peter Kirstein Networks Research Group Computer Science UCL 46PaQ AHM 2005 UKLIGHT Workshop, 19 Sep 2005 1 Today s talk Overview Current Status and Results Future Work

More information

Buffer Sizing in a Combined Input Output Queued (CIOQ) Switch

Buffer Sizing in a Combined Input Output Queued (CIOQ) Switch Buffer Sizing in a Combined Input Output Queued (CIOQ) Switch Neda Beheshti, Nick Mckeown Stanford University Abstract In all internet routers buffers are needed to hold packets during times of congestion.

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question

More information

Expected Time: 90 min PART-A Max Marks: 42

Expected Time: 90 min PART-A Max Marks: 42 Birla Institute of Technology & Science, Pilani First Semester 2010-2011 Computer Networks (BITS C481) Comprehensive Examination Thursday, December 02, 2010 (AN) Duration: 3 Hrs Weightage: 40% [80M] Instructions-:

More information

Resource Sharing for QoS in Agile All Photonic Networks

Resource Sharing for QoS in Agile All Photonic Networks Resource Sharing for QoS in Agile All Photonic Networks Anton Vinokurov, Xiao Liu, Lorne G Mason Department of Electrical and Computer Engineering, McGill University, Montreal, Canada, H3A 2A7 E-mail:

More information

A Low Latency Solution Stack for High Frequency Trading. High-Frequency Trading. Solution. White Paper

A Low Latency Solution Stack for High Frequency Trading. High-Frequency Trading. Solution. White Paper A Low Latency Solution Stack for High Frequency Trading White Paper High-Frequency Trading High-frequency trading has gained a strong foothold in financial markets, driven by several factors including

More information

Implications of Proxy Caching for Provisioning Networks and Servers

Implications of Proxy Caching for Provisioning Networks and Servers Implications of Proxy Caching for Provisioning Networks and Servers Mohammad S. Raunak, Prashant Shenoy, Pawan GoyalÞand Krithi Ramamritham Ý Department of Computer Science, ÞEnsim Corporation, University

More information

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL AIM: To conduct an experiment to demonstrate the working of file transfer with the UDP Server and Client. APPARATUS REQUIRED: PC with network simulation

More information

On the State of ECN and TCP Options on the Internet

On the State of ECN and TCP Options on the Internet On the State of ECN and TCP Options on the Internet PAM 2013, March 19, Hong Kong Mirja Kühlewind Sebastian Neuner Brian

More information

On the 95-percentile billing method

On the 95-percentile billing method On the 95-percentile billing method Xenofontas Dimitropoulos 1, Paul Hurley 2, Andreas Kind 2, and Marc Ph. Stoecklin 2 1 ETH Zürich fontas@tik.ee.ethz.ch 2 IBM Research Zürich {pah,ank,mtc}@zurich.ibm.com

More information

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm QoS on Low Bandwidth High Delay Links Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm Agenda QoS Some Basics What are the characteristics of High Delay Low Bandwidth link What factors

More information

Advanced Computer Networks. Flow Control

Advanced Computer Networks. Flow Control Advanced Computer Networks 263 3501 00 Flow Control Patrick Stuedi Spring Semester 2017 1 Oriana Riva, Department of Computer Science ETH Zürich Last week TCP in Datacenters Avoid incast problem - Reduce

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

CMSC 332 Computer Networks Network Layer

CMSC 332 Computer Networks Network Layer CMSC 332 Computer Networks Network Layer Professor Szajda CMSC 332: Computer Networks Where in the Stack... CMSC 332: Computer Network 2 Where in the Stack... Application CMSC 332: Computer Network 2 Where

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction In a packet-switched network, packets are buffered when they cannot be processed or transmitted at the rate they arrive. There are three main reasons that a router, with generic

More information

Evaluating Circuit Emulation Adapters

Evaluating Circuit Emulation Adapters Semester Project Summer Semester 2006 Evaluating Circuit Emulation Adapters Jelena P. Stamenkovic Tutor: Dr. Ulrich Fiedler, Rainer Baumann Supervisor: Prof. Dr. Bernhard Plattner

More information

Packet Coloring for Intelligent Traffic Management In Wireless Networks

Packet Coloring for Intelligent Traffic Management In Wireless Networks Packet Coloring for Intelligent Traffic Management In Wireless Networks Doru Calin, Bongho Kim Nokia Murray Hill NJ, USA Francis Bourriaud Nokia Villarceaux, France Abstract- Delivering committed traffic

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

InfiniBand SDR, DDR, and QDR Technology Guide

InfiniBand SDR, DDR, and QDR Technology Guide White Paper InfiniBand SDR, DDR, and QDR Technology Guide The InfiniBand standard supports single, double, and quadruple data rate that enables an InfiniBand link to transmit more data. This paper discusses

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

WHITE PAPER. Latency & Jitter WHITE PAPER OVERVIEW

WHITE PAPER. Latency & Jitter WHITE PAPER OVERVIEW Latency & Jitter In Networking Performance Evaluation OVERVIEW Latency and jitter are two key measurement parameters when evaluating and benchmarking the performance of a network, system or device. Different

More information

Experiments on TCP Re-Ordering March 27 th 2017

Experiments on TCP Re-Ordering March 27 th 2017 Experiments on TCP Re-Ordering March 27 th 2017 Introduction The Transmission Control Protocol (TCP) is very sensitive to the behavior of packets sent end-to-end. Variations in arrival time ( jitter )

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther

More information

Four-Socket Server Consolidation Using SQL Server 2008

Four-Socket Server Consolidation Using SQL Server 2008 Four-Socket Server Consolidation Using SQL Server 28 A Dell Technical White Paper Authors Raghunatha M Leena Basanthi K Executive Summary Businesses of all sizes often face challenges with legacy hardware

More information

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks

More information

IBM MQ Appliance HA and DR Performance Report Model: M2001 Version 3.0 September 2018

IBM MQ Appliance HA and DR Performance Report Model: M2001 Version 3.0 September 2018 IBM MQ Appliance HA and DR Performance Report Model: M2001 Version 3.0 September 2018 Sam Massey IBM MQ Performance IBM UK Laboratories Hursley Park Winchester Hampshire 1 Notices Please take Note! Before

More information

Application Note. Re-timing: Cost-effective Synchronization via Re-timed E1 and DS1 Signals. Precision, Stability, Innovation, Support.

Application Note. Re-timing: Cost-effective Synchronization via Re-timed E1 and DS1 Signals. Precision, Stability, Innovation, Support. Re-timing: Cost-effective Synchronization via Re-timed E1 and DS1 Signals Application Note Number 14 TELECOM NETWORKS PROFESSIONAL MANUFACTURING POWER & UTILITIES DIGITAL BROADCASING TIME & FREQUENCY TIME

More information

Switch Configuration message sent 1 (1, 0, 1) 2

Switch Configuration message sent 1 (1, 0, 1) 2 UNIVESITY COLLEGE LONON EPATMENT OF COMPUTE SCIENCE COMP00: Networked Systems Problem Set istributed: nd November 08 NOT ASSESSE, model answers released: 9th November 08 Instructions: This problem set

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Configuring Cisco IOS IP SLAs Operations

Configuring Cisco IOS IP SLAs Operations CHAPTER 50 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service

More information

IP SLA Service Performance Testing

IP SLA Service Performance Testing This module describes how to configure the ITU-T Y.1564 Ethernet service performance test methodology that measures the ability of a network device to enable movement of traffic at the configured data

More information

Configuring Cisco IOS IP SLA Operations

Configuring Cisco IOS IP SLA Operations CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels

More information

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks E. Kozlovski, M. Düser, R. I. Killey, and P. Bayvel Department of and Electrical Engineering, University

More information

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2016 INSTRUCTIONS 1. Write your solution into this document and return it to us (you

More information

On the Interdependence of Congestion and Contention in Wireless Sensor Networks

On the Interdependence of Congestion and Contention in Wireless Sensor Networks On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

EXAM TCP/IP NETWORKING Duration: 3 hours

EXAM TCP/IP NETWORKING Duration: 3 hours SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2017 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to

More information

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli)

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) TCP CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) 1 Sources Fall and Stevens, TCP/IP Illustrated Vol. 1, 2nd edition Congestion Avoidance

More information

Layer 4 TCP Performance in carrier transport networks Throughput is not always equal to bandwidth

Layer 4 TCP Performance in carrier transport networks Throughput is not always equal to bandwidth Layer 4 TCP Performance in carrier transport networks Throughput is not always equal to bandwidth Roland Stooss JDSU Deutschland GmbH Senior Consultant Data/IP Analysis Solutions Mühleweg 5, D-72800 Eningen

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information